Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Updates in Video Management Software Highlight Scalability

By Keven Marier
March 1, 2013

It’s safe to say that the video management software products have begun the 2.0 era. This era is all about how big the software can scale, and each year the industry will announce the new “biggest” system thus far. Included in this 2.0 era are concepts like VSaaS and virtualization, which decouples the hardware limitations from the software scalability. When the concept of video management software was being developed in the early IP camera days, the security industry was focused on the NVR, whose key function was to record networked surveillance cameras compared to the DVR, which recorded analog surveillance cameras. Over the past four years, however, the NVR and DVR have basically merged into the recording appliance product category. These devices are still hardware, rather than software-centric, and because of this they have built in hardware limitations that keep them from scaling. The merger of the NVR and DVR could be seen as a consolidation event within the market, where the blending of the products allows room for the new product segment to take over as “the next big thing.”  The next big thing is the 2.0 VMS product category, which is all about scaling big.

 

1.0 VMS vs. 2.0 VMS

The initial video management software products were basically recorder software that was independent of a hardware platform. These software-only recording products provided basic recording features and have evolved into the 2.0 versions, which see recording as one of hundreds of features. As features have expanded, the 2.0 VMS products are able to successfully scale to thousands of camera devices under a single video management system. When thousands of devices are networked together and these deployments are geographically dispersed the management feature capabilities become most important and recording becomes secondary. As recording has become secondary, the role of the hardware-centric NVR has become the bottleneck in creating a completely scalable video security solution. In addition, the 1.0 VMS products were also not able to scale because they lacked the mature management capabilities and were still very hardware dependent. The 2.0 VMS products don’t have these challenges and they will drive the security industry towards scalable IP-based systems even faster.

 

Hardware Virtualization

The biggest enabling technology that is driving the scaling capabilities of the VMS 2.0 product segment is hardware virtualization software from Microsoft or VMWare. These software technologies are used by every IT department and provide significant management capabilities. However, the use of them within the security industry is very limited. The technology that is driving the VMS 2.0 products including the video surveillance as a service or cloud-based systems is virtualization. When used, virtualization technology completely eliminates the hardware performance bottlenecks that plague the NVR/DVR and VMS 1.0 product segments. In addition, Intel CPU’s have been designed to support virtualization without any virtualization performance overhead. This truly opens up the security industry, where price/performance for recording is can be designed below $30 per camera in large virtualized VMS 2.0 designs, compared to well above $300 per camera in the NVR hardware-centric designs.

 

Software Feature Wars

The explosion of new features is also a sign that the VMS 2.0 era has begun. Those features are not focused on the cameras; they are instead providing overall systems functionality like user management, mobile clients and data security.  For the first time within the security industry, we are seeing feature-rich software with capabilities that solve problems that occur when you scale a networked surveillance system. The challenges that come with large-scale environments are complexity of design and management. These will require significant training investments of time and money, because as systems get more complex they require more competent staff to work with them.

 

Larger Numbers of Camera Deployments

There are significant security operational efficiencies that can be realized by security directors of large companies or governments. The resulting returns on investment look to be substantial. This ability to see the ROI is leading to even larger investments in camera infrastructure, and it creates the market for the scalable VMS 2.0 products.

 

Expanding Management Capabilities

Over the next few years the VMS 2.0 market will continue to make big investments in expanding the management capabilities even more, and this will continue to drive the segmentation and specialization of video surveillance software clients. This trend is already well on its way, with many systems having separate viewing clients and management clients and the latter becoming increasingly important. These video management clients are focusing on large-scale configuration, monitoring and reporting. Welcome to the VMS 2.0 era, where scalability is the killer app.  

 

This article was previously published in the print magazine as "Video Management Software 2.0=Scalability."

KEYWORDS: camera deployment hardware virtualization scalable surveillance video management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Software in the Middle of the New Physical Security Economy

    See More
  • Choosing the Right Video Recording Technology for Your Enterprise

    See More
  • Keeping New Video Analytics Simple

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s in europe.jpg

    Surveillance in Europe

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing